HITRUST Self Assessment

HITRUST Self Assessment

International corporate entities, insurance firms, medical practices, hospitals, state and federal government agencies and other companies that operate in the healthcare sector are charged with the crucial responsibility of protecting, storing and transmitting patient...
HITRUST Certification Requirements

HITRUST Certification Requirements

Blog  HITRUST Certification Requirements HITRUST Certification Requirements To streamline the complex process of complying with a wide range of security standards, representatives from information security, technology, business, and healthcare formed a consortium...
ISO 27001 Checklist

ISO 27001 Checklist

ISO 27001 (formerly known as ISO/IEC 27001:27005) is a set of specifications that helps you to assess the risks found in your information security management system (ISMS). Implementing it helps to ensure that risks are identified, assessed and managed in a...
ISO 27001 Risk Assessment Methodology

ISO 27001 Risk Assessment Methodology

Blog  ISO 27001 Risk Assessment Methodology ISO 27001 Risk Assessment Methodology Conducting an internal ISO 27001 audit enables you to assess your company’s security equipment, systems, protocols and procedures to ensure that they are in compliance with industry...
How to Conduct an Internal ISO 27001 Audit

How to Conduct an Internal ISO 27001 Audit

Blog  How to Conduct an Internal ISO 27001 Audit How to Conduct an Internal ISO 27001 Audit In order for your information security management system (ISMS) to be viable, you must periodically receive an internal, independent audit that shows how it is meeting the...
PCI Compliance for Small Business

PCI Compliance for Small Business

When customers’ sensitive information is stolen during a data breach, the financial and resource costs to those buyers as well as to the retail merchants involved can be significant. In an effort to protect customer information during the payment transaction process,...
SOC 2 vs. ISO 27001: Key Differences

SOC 2 vs. ISO 27001: Key Differences

Blog  SOC 2 vs. ISO 27001: Key Differences SOC 2 vs. ISO 27001: Key Differences Deciding between SOC 2 and ISO 27001 certifications can be like choosing the correct key for a specific lock. One focuses on managing how service providers handle customer data, while the...
PCI DSS Compliance Fines and Consequences

PCI DSS Compliance Fines and Consequences

​Data security is one of the highest priorities for modern businesses. Recognizing this critical need, the five major credit card companies formed the Payment Card Industry Security Standards Council (PCI SSC). In due course, that consortium devised the new Payment...
What is AWS PCI Compliance?

What is AWS PCI Compliance?

Blog  What is AWS PCI Compliance? What is AWS PCI Compliance? If your business handles payment card data, you need to be familiar with PCI DSS compliance. But what exactly is this standard, and why is it so important? The Payment Card Industry Data Security Standard...
SOC 1 vs SOC 2

SOC 1 vs SOC 2

Blog  SOC 1 vs SOC 2 SOC 1 vs SOC 2 When it comes to keeping your organization’s data secure and compliant, understanding SOC reports is a must. SOC 1 and SOC 2 might sound like technical jargon, but they’re actually quite important for financial reporting and data...
SOC 1 Audit Checklist

SOC 1 Audit Checklist

Blog  SOC 1 Audit Checklist SOC 1 Audit Checklist Third-party companies hired to transmit, hold or store the cardholder data of a business’s customers have a grave responsibility. In this age of viruses, ransomware, and data breaches, all service organizations...